2020
DOI: 10.3390/e22060600
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Steganography in PDF Files—Secrets Hidden in Modified Pages

Abstract: This paper shows how to diffuse a message and hide it in multiple PDF files. Presented method uses dereferenced objects and secret splitting or sharing algorithms. It is applicable to various types of PDF files, including text documents, presentations, scanned images etc. Because hiding process is based on structure manipulation, the solution may be easily combined with content-dependent steganographic techniques. The hidden pages are not visible in typical application usage, which was tested with seven differ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Various concealment methods, including steganography techniques, can be employed to hide information in PDF files, as elucidated in previous research [37]. In this study, the authors utilized tools such as pdftk and mergepdf to amalgamate PDFs, thereby creating a NewDataset through the fusion of malicious PDFs with non-malicious counterparts, as depicted in Figure 4.…”
Section: A New Dataset Creationmentioning
confidence: 99%
“…Various concealment methods, including steganography techniques, can be employed to hide information in PDF files, as elucidated in previous research [37]. In this study, the authors utilized tools such as pdftk and mergepdf to amalgamate PDFs, thereby creating a NewDataset through the fusion of malicious PDFs with non-malicious counterparts, as depicted in Figure 4.…”
Section: A New Dataset Creationmentioning
confidence: 99%
“…Steganography also makes covert communications easier, especially when it comes to corporate and national security issues. This has potential uses in protecting confidential data [20]. It is also essential for the safe transportation of sensitive data [21].…”
Section: The Uses Of Steganographymentioning
confidence: 99%
“…For this reason, the most suitable are injection algorithms, which are independent of the content, and maybe in some applications, the substitution methods can also be used. An example of the recommended approach is to store the data block in the JPEG comment section [ 20 ]. It may be later pulled out in the same way as all other photo metadata.…”
Section: Creation Of Data Blocksmentioning
confidence: 99%